03/04/2026 | Press release | Distributed by Public on 03/04/2026 10:31
One email was all it took. An employee clicked what looked like a routine sign - in request. Behind the scenes, attackers swiped credentials, slipped past security controls, impersonated a trusted user, and gained access to critical systems. In other cases, similar intrusions delayed paychecks, rerouted invoices, stole sensitive data, locked up entire networks, interrupted patient care, and strained already tight budgets at schools and critical services.
Those attacks were powered by Tycoon 2FA. Today, Microsoft, Europol, and industry partners announced a coordinated action to disrupt the service responsible for tens of millions of fraudulent emails reaching over 500,000 organizations each month worldwide.
Disrupting a global phishing operation
Active since at least 2023, Tycoon 2FA enabled thousands of cybercriminals to impersonate real users and gain unauthorized access to email and online service accounts, including Microsoft 365, Outlook, and Gmail. Unlike traditional phishing kits, Tycoon 2FA was designed to defeat additional security protections, including multifactor authentication, allowing cybercriminals to log in as legitimate users without triggering alerts, even on protected accounts.
Acting under a court order from the U.S. District Court for the Southern District of New York, and for the first time in coordination with Europol's Cyber Intelligence Extension Programme (CIEP) , Microsoft seized 330 active domains that powered Tycoon 2FA's core infrastructure, including control panels and fraudulent login pages. The CIEP framework brought public - and private - sector partners together to move from simply sharing intelligence to coordinated, cross - border action, accelerating disruption and limiting further harm.
Taking this infrastructure offline cuts off a major pipeline for account takeovers and helps protect people and organizations from follow - on attacks such as data theft, ransomware, business email compromise, and financial fraud.
The scale and real - world impact of Tycoon 2FA
By mid - 2025, Tycoon 2FA accounted for approximately 62 percent of all phishing attempts Microsoft blocked, including more than 30 million emails in a single month. That placed Tycoon 2FA among the largest phishing operations globally.
Despite extensive defenses, the service is linked to an estimated 96,000 distinct phishing victims worldwide since 2023, including more than 55,000 Microsoft customers.
Healthcare and education organizations were hit hardest. More than 100 members of Health - ISAC , a global threat-sharing group for the health sector and a co-plaintiff in this case, were successfully phished. In New York alone, at least two hospitals, six municipal schools, and three universities faced attempted or successful compromise through Tycoon 2FA. These incidents had tangible consequences: disrupted operations, diverted resources, and delayed patient care.
Why Tycoon 2FA was so dangerous
Tycoon 2FA combined convincing phishing templates, realistic landing pages, and real - time capture of credentials and authentication codes into an easy - to - use package that scaled quickly. By lowering the technical barrier to entry, it allowed criminals with limited expertise to run sophisticated impersonation campaigns.
With each successful phishing victim, attackers could operate with the same level of trust as legitimate users moving laterally across systems, accessing sensitive data, and abusing sign - on connections without raising alarms. Research from Microsoft Threat Intelligence provides more details on how Tycoon 2FA operated.
This shift reflects a broader trend in cybercrime: identity, not infrastructure, has become the primary target . A single compromised account can now unlock banking systems, healthcare portals, workplace applications, and social media accounts.
Inside the impersonation economy
Tycoon 2FA operated like a business within the broader impersonation - for - hire ecosystem. The primary developer, Saad Fridi, who is believed to be based in Pakistan, worked alongside partners responsible for marketing, payments, and technical support.
Cybercriminals typically used Tycoon 2FA alongside other illicit services. While Tycoon 2FA captured credentials and session tokens, other services handled mass email delivery, malware distribution, hosting, and access monetization. For example, RedVDS , disrupted by Microsoft in January 2026, provided inexpensive virtual computers, which cybercriminals paired with Tycoon 2FA to deliver phishing campaigns. Together, these different services created an interconnected ecosystem for identity - based attacks. Disrupting one component can have cascading effects across the cybercrime economy.
Sustained pressure reshapes the market
Over the past 18 months, Microsoft's Digital Crimes Unit has targeted multiple services that enable impersonation and initial access, including extensive disruption operations of Lumma Stealer , RaccoonO365 , Fake ONNX (aka "Caffeine"), and RedVDS .
When widely used tools are disrupted, attackers are forced to adapt, often shifting to alternatives like Tycoon 2FA. This substitution pattern shows how sustained pressure prevents any single service from remaining dominant while steadily raising the cost and risk of cybercrime.
These efforts have led to arrests in Egypt and Nigeria , complete service shutdowns, infrastructure loss, and reputational damage for operators beyond law - enforcement reach. RedVDS alone lost more than 95 percent of its infrastructure since January 2026, significantly degrading its ability to support mass impersonation campaigns and other online scams.
As pressure increased, many operators tightened access controls, retreated into closed channels, or shut down entirely to avoid legal action. In Tycoon 2FA's case, Microsoft could not purchase access to the service; the operator rejected attempts by our investigators, requiring a trusted intermediary. In fact, Tycoon 2FA's operator and the now - arrested developer of RaccoonO365 communicated with one another, highlighting the ecosystem's interdependence and how disruptions in one area influence activity elsewhere.
Global threats require global action
Cybercrime operates across borders, and effective response must do the same. Disrupting Tycoon 2FA spanned multiple jurisdictions, underscoring why sustained, coordinated pressure is essential, especially as cybercrime becomes more scalable through automation and AI.
Microsoft Threat Intelligence, joining many security researchers, identified Tycoon 2FA as one of the most significant threats to identity-based attacks. Microsoft's Digital Crimes Unit consulted with Europol, which also tracked the actor based on intelligence supplied by TrendAI . Through the CIEP, Europol convened partners to take action. Microsoft worked with industry partners to pursue a coordinated infrastructure disruption, while law enforcement authorities in Latvia, Lithuania, Portugal, Poland, Spain, and the United Kingdom conducted seizures of infrastructure and carried out other operational measures linked to Tycoon 2FA.
Industry partners, including Proofpoint , Intel 471 , and eSentire , expanded visibility through telemetry, threat intelligence, and criminal - forum insight. Cloudflare assisted by taking down infrastructure outside U.S. jurisdiction, while Health - ISAC quantified impacts on healthcare organizations. SpyCloud contributed key victimology data, Resecurity facilitated access to Tycoon 2FA, and Coinbase helped trace the movement of stolen funds. Finally, the Shadowserver Foundation supported notifications to more than 200 computer emergency response teams worldwide, helping limit further harm.
No single organization could have assembled this full picture alone.
Sustaining pressure, together
Stopping identity - based cybercrime requires action across individuals, organizations, and governments. Multifactor authentication, scrutiny of unexpected messages, strong session controls, and coordinated threat - sharing all reduce risk. Early enforcement matters too ; it prevents small intrusions from escalating into systemic harm. Microsoft will continue applying the lessons learned from Tycoon 2FA and prior disruptions to fragment the impersonation economy, limit scale, and make cybercrime riskier and less profitable.